Miggo Logo

CVE-2025-53832:
@translated/lara-mcp vulnerable to command injection in import_tmx tool

7.5

CVSS Score
3.1

Basic Information

EPSS Score
-
Published
7/21/2025
Updated
7/21/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
@translated/lara-mcpnpm<= 0.0.110.0.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in the importTmx function within the @translated/lara-mcp package. The root cause is the improper neutralization of special elements used in a command, a vulnerability type also known as Command Injection (CWE-77). The importTmx function constructs a curl command by embedding a user-provided URL (tmx_url) directly into the command string. This string is then executed by child_process.exec. Because the tmx_url is not sanitized, an attacker can inject arbitrary shell commands by crafting a malicious URL (e.g., "$(touch /tmp/pwned)"). The provided patch addresses this vulnerability by removing the feature that allowed importing a TMX file from a URL. The new implementation of importTmx only accepts the TMX content directly (tmx_content), eliminating the use of child_process.exec and the associated command injection risk. Any runtime profile of the vulnerable version would show the importTmx function being called during exploitation.

Vulnerable functions

importTmx
src/tools/import_tmx.ts
The function `importTmx` is vulnerable to command injection. It takes a `tmx_url` from user input and uses it to construct a shell command that is executed using `child_process.exec`. An attacker can provide a malicious URL containing shell metacharacters to execute arbitrary commands on the server. The patch completely removes the functionality of importing from a URL, thus mitigating the vulnerability.

WAF Protection Rules

WAF Rule

### Summ*ry * *omm*n* inj**tion vuln*r**ility *xists in t** `@tr*nsl*t**/l*r*-m*p` M*P S*rv*r. T** vuln*r**ility is **us** *y t** uns*nitiz** us* o* input p*r*m*t*rs wit*in * **ll to `**il*_pro**ss.*x**`, *n**lin* *n *tt**k*r to inj**t *r*itr*ry sys

Reasoning

T** vuln*r**ility *xists in t** `importTmx` *un*tion wit*in t** `@tr*nsl*t**/l*r*-m*p` p**k***. T** root **us* is t** improp*r n*utr*liz*tion o* sp**i*l *l*m*nts us** in * *omm*n*, * vuln*r**ility typ* *lso known *s *omm*n* Inj**tion (*W*-**). T** `i